SSCP | Systems Security Certified Practitioner


The best entry level IT security certification

The SSCP certification from (ISC)² is ideal for security practitioners who want to elevate their level of expertise in system security.

On-Demand, Bootcamp or Virtual Classroom options

Access online course content, videos, exercises, discussions and chats

Pre and post course assessments

Virtual labs for hands-on experience

Live lab add-ons available

Develop real-life skills you can apply in the workplace with Live Labs

Access to over 25,000 e-books and 30,000 downloadable video tutorials

Expert mentoring and coaching to answer questions and guide your learning

Course completion certificates

Cybersecurity Career Guide




Certifications like the SSCP provide lucrative opportunities for security specialists who are willing to train on a new skill.



The demand for IT security experts with certifications like the SSCP continues to grow as the increasing number of cybersecurity attacks continues to rise.



Earn an systems security certification from the world renowned leader in cybersecurity.

Course guide

Qualification: SSCP

Study time: Full time – five to six days | Part time – six weeks

Vendor: (ISC)²

Student support: Success Advisors

Prerequisites: One year+ experience in information security + subscription to (ISC)² Code of Ethics recommended

Assessment: Exam based – SSCP

Resources: Internet access and email

Ideal for: Senior network security engineers, senior security systems analysts or senior security administrators


SSCP introduction

  • Information security
  • SSCP
  • CBK
  • Security concerns

Access control

  • Identification, authentication, authorisation and accounting
  • Access control techniques
  • Best practices for access control
  • Access control administration
  • Access control models, methodologies and implementation Physical security
  • Attacks
  • Monitoring and intrusion detection
  • Penetration testing


  • The C.I.A. triad policy, standards, guidelines and baselines
  • Privacy issues and regulation
  • Data classification
  • Security architecture and design
  • Controls, evaluation criteria and security models
  • Development lifecycle
  • Configuration management
  • Hardware components
  • Employment practices
  • Security threats and attacks

Audit and monitoring

  • Types of controls
  • Incident response and analysis
  • Monitoring devices and techniques


  • Cryptographic terms and technologies
  • Message authentication
  • Certificate authority

Data communications

  • Security overview
  • Internet, intranet and extranet security
  • TCP/IP LANs, WANs and VPNs
  • Network layer security protocols
  • Transport layer security
  • Application layer security protocols

Malicious code and malware

  • Malicious code types
  • Mobile code threats
  • Types of attacks

Risk response and recovery

  • Risk management
  • Knowledge based systems
  • Safeguards and countermeasures
  • Incident handling
  • Forensics Business continuity project planning

Get certified the KnowledgeNet way

Professional development that works around you

  • World’s #1 eLearning portal
  • 12 months unlimited access
  • Expert mentors
  • Test prep
  • Global community of peers
  • Award winning training used globally by leading corporate clients